Online Library TheLib.net » Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers

This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.




This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.


This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
Content:
Front Matter....Pages -
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks....Pages 1-18
An On-Line Learning Statistical Model to Detect Malicious Web Requests....Pages 19-38
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems....Pages 39-58
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access....Pages 59-76
Analyzing the Gold Star Scheme in a Split Tor Network....Pages 77-95
Location Privacy and Attacker Knowledge: Who Are We Fighting against?....Pages 96-115
Insecurity in Public-Safety Communications: APCO Project 25....Pages 116-133
Behavioral Mimicry Covert Communication....Pages 134-153
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks....Pages 154-171
On Detection of Erratic Arguments....Pages 172-189
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits....Pages 190-208
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots....Pages 209-226
Optimistic Fair Exchange of Ring Signatures....Pages 227-242
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards....Pages 243-260
Multi-party Private Web Search with Untrusted Partners....Pages 261-280
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning....Pages 281-302
Unilateral Antidotes to DNS Poisoning....Pages 303-318
Security Analysis of Leap-of-Faith Protocols....Pages 319-336
Secure and Practical Key Distribution for RFID-Enabled Supply Chains....Pages 337-355
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane....Pages 356-372
Context-Related Access Control for Mobile Caching....Pages 373-388
Anonymity for Key-Trees with Adaptive Adversaries....Pages 389-408
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag....Pages 409-425
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines....Pages 426-435
Winning with DNS Failures: Strategies for Faster Botnet Detection....Pages 436-445
Trading Elephants for Ants: Efficient Post-attack Reconstitution....Pages 446-459
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data....Pages 460-469
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks....Pages 470-479
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services....Pages 480-490
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks....Pages 491-500
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks....Pages 501-510
Build and Test Your Own Network Configuration....Pages 511-521
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks....Pages 522-532
NetFlow Based Network Protection....Pages 533-542
Back Matter....Pages 543-546
....Pages -
Download the book Security and Privacy in Communication Networks: 7th International ICST Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen